Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585922
Seghier Imene, Mourad Chaa, Chebbara Fouad, Abdullah Meraoumia
These days, new technological solutions are gradually being implemented to fight against identity theft, document fraud, cybercrime, and threats from terrorism. Among these technologies, biometrics quickly emerged as the most relevant to identify and authenticate personnel reliably and quickly, based on unique biological characteristics. This paper presents a novel and efficient scheme to extract features for Finger-Knuckle-Print (FKP) recognition. First, the Accumulated Edge Magnitudes Images (AEMI) has been extracted from each ROI FKP image. Then, Gabor Filter bank is utilized to extract features from these AEMIs images. The extracted features from AEMIs images are concatenated to form a large feature vector. Finally, kernel fisher analysis (KFA) is used as a dimensionality reduction technique to build the best feature representant for each FKP image. For matching stage, the cosine distance is used to ascertain the identity of the person. Experimental results using publicly available PolyU FKP dataset show that the presented framework notably attained best performance and outperformed the state-of-the-art techniques.
{"title":"Features-Level Fusion of accumulated Edge Magnitudes Images in Finger-Knuckle-Print authentification","authors":"Seghier Imene, Mourad Chaa, Chebbara Fouad, Abdullah Meraoumia","doi":"10.1109/ICRAMI52622.2021.9585922","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585922","url":null,"abstract":"These days, new technological solutions are gradually being implemented to fight against identity theft, document fraud, cybercrime, and threats from terrorism. Among these technologies, biometrics quickly emerged as the most relevant to identify and authenticate personnel reliably and quickly, based on unique biological characteristics. This paper presents a novel and efficient scheme to extract features for Finger-Knuckle-Print (FKP) recognition. First, the Accumulated Edge Magnitudes Images (AEMI) has been extracted from each ROI FKP image. Then, Gabor Filter bank is utilized to extract features from these AEMIs images. The extracted features from AEMIs images are concatenated to form a large feature vector. Finally, kernel fisher analysis (KFA) is used as a dimensionality reduction technique to build the best feature representant for each FKP image. For matching stage, the cosine distance is used to ascertain the identity of the person. Experimental results using publicly available PolyU FKP dataset show that the presented framework notably attained best performance and outperformed the state-of-the-art techniques.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585965
Sarra Benadla, Omar Rafik Merad-Boudia
The Internet of Vehicles (IoV) is a network that considers vehicles as intelligent machines. They interact and communicate with each other to improve the performance and safety of traffic. IoV solves certain problems, but it has some issues such as response time, which prompted researchers to propose the integration of Fog Computing into vehicular networks. In Vehicular Fog Computing (VFC), the services are provided at the edge of the network to increase data rate and reduce response time. However, in order to satisfy network users, the security and privacy of sensitive data should be guaranteed. Using pseudonyms instead of real identities is one of the techniques considered to preserve the privacy of users, however, this can push malicious vehicles to exploit such a process and launch the Sybil attack by creating several pseudonyms in order to perform various malicious activities. In this paper, we describe the Sybil attack effects on VFC networks and compare them to those in conventional networks, as well as identify the various existing methods for detecting this attack and determine if they are applicable to VFC networks.
{"title":"The Impact of Sybil Attacks on Vehicular Fog Networks","authors":"Sarra Benadla, Omar Rafik Merad-Boudia","doi":"10.1109/ICRAMI52622.2021.9585965","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585965","url":null,"abstract":"The Internet of Vehicles (IoV) is a network that considers vehicles as intelligent machines. They interact and communicate with each other to improve the performance and safety of traffic. IoV solves certain problems, but it has some issues such as response time, which prompted researchers to propose the integration of Fog Computing into vehicular networks. In Vehicular Fog Computing (VFC), the services are provided at the edge of the network to increase data rate and reduce response time. However, in order to satisfy network users, the security and privacy of sensitive data should be guaranteed. Using pseudonyms instead of real identities is one of the techniques considered to preserve the privacy of users, however, this can push malicious vehicles to exploit such a process and launch the Sybil attack by creating several pseudonyms in order to perform various malicious activities. In this paper, we describe the Sybil attack effects on VFC networks and compare them to those in conventional networks, as well as identify the various existing methods for detecting this attack and determine if they are applicable to VFC networks.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132016502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The widespread use of medical imaging by doctors has made computers a necessity for imaging and analysis. Several clinical decision-making tools have been developed to assess osteoporosis risk through bone density measurement and/or bone image analysis. The purpose of this study is to develop a hierarchical prototype-based approach for classification of osteoporosis. This approach allows you to interactively recognize the multimodal distribution and data space of different levels of data streaming, where you also identify meaningful prototypes for self-organization and self-development hierarchies. The decision-making process is based on the "closest prototype" principle and is clear. The proposed method allows users to present the information retrieved from the data in a hierarchical and easily interpretable form based on a prototype, and is an attractive tool for solving large and complex problems in the real world.
{"title":"A Hierarchical Prototype-Based Approach for Osteoporosis Classification","authors":"Mebarkia Meriem, Meraoumia Abdallah, Houam Lotfi, Khemaissia Seddik","doi":"10.1109/ICRAMI52622.2021.9585919","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585919","url":null,"abstract":"The widespread use of medical imaging by doctors has made computers a necessity for imaging and analysis. Several clinical decision-making tools have been developed to assess osteoporosis risk through bone density measurement and/or bone image analysis. The purpose of this study is to develop a hierarchical prototype-based approach for classification of osteoporosis. This approach allows you to interactively recognize the multimodal distribution and data space of different levels of data streaming, where you also identify meaningful prototypes for self-organization and self-development hierarchies. The decision-making process is based on the \"closest prototype\" principle and is clear. The proposed method allows users to present the information retrieved from the data in a hierarchical and easily interpretable form based on a prototype, and is an attractive tool for solving large and complex problems in the real world.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585915
Redouane Douaifia, S. Abdelmalek, B. Rebiai
This paper primarily seeks to extend the results of Rebiai and Benachour [10] on the global existence, uniqueness, uniform boundedness, and the asymptotic behavior of solutions for a weakly coupled reaction-diffusion systems with exponential nonlinearity on a growing domain with an isotropic growth, the desired results are obtained by using Lyapunov functions’ method. The theoretical findings are supported and affirmed by numerical simulation.
{"title":"Global Existence, Asymptotic Stability and Numerical Simulation for Reaction-Diffusion Systems with Exponential Nonlinearity on Growing Domains","authors":"Redouane Douaifia, S. Abdelmalek, B. Rebiai","doi":"10.1109/ICRAMI52622.2021.9585915","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585915","url":null,"abstract":"This paper primarily seeks to extend the results of Rebiai and Benachour [10] on the global existence, uniqueness, uniform boundedness, and the asymptotic behavior of solutions for a weakly coupled reaction-diffusion systems with exponential nonlinearity on a growing domain with an isotropic growth, the desired results are obtained by using Lyapunov functions’ method. The theoretical findings are supported and affirmed by numerical simulation.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585916
Rofaida Khemaissia, M. Derdour, M. Ferrag, A. Djeddai
Due to the blooming trend of information technologies, attacks have become widespread and sophisticated, which calls to build a strong defense design that works with the attack evolution. The countermeasure selection enables the system to retrieve its health. However, privacy concerns are also introduced in the selection process, which makes the business companies less credible, which affects both users and services. In this paper we propose a dynamic defense framework that allows selecting the optimal countermeasure which brings between the blockchain-based privacy preserving and the countermeasure selection in order to estimate the privacy coverage in the quantitative metric.
{"title":"Network Countermeasure Selection Under Blockchain Based Privacy Preserving","authors":"Rofaida Khemaissia, M. Derdour, M. Ferrag, A. Djeddai","doi":"10.1109/ICRAMI52622.2021.9585916","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585916","url":null,"abstract":"Due to the blooming trend of information technologies, attacks have become widespread and sophisticated, which calls to build a strong defense design that works with the attack evolution. The countermeasure selection enables the system to retrieve its health. However, privacy concerns are also introduced in the selection process, which makes the business companies less credible, which affects both users and services. In this paper we propose a dynamic defense framework that allows selecting the optimal countermeasure which brings between the blockchain-based privacy preserving and the countermeasure selection in order to estimate the privacy coverage in the quantitative metric.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we have proposed in unknown setting, there is an impediment avoidance for a mobile robot based on the fuzzy logic control. Therefore, the wheeled mobile robot is equipped with 3 wheels, one steering wheel and two fixed wheels and mounted on the same axis. It functions to lift from a starting point to a target position. For this, our proposed algorithm creates one or more imaginary target and applies a fuzzy logic control system, which is adopted by a rule table that is induced from two inputs data (the distance and the angle between the robot and the target) and two outputs data (the angle orientation and velocity of the steer wheel). Experiential outcomes show how effective and functional the suggested algorithm it is.
{"title":"An Optimized Path Planning for Wheeled Robot in Obstacle Environments","authors":"Mohamed Amine Yakoubi, Djamel Bektache, Abderahmane Gaham, Raouf Toumi","doi":"10.1109/ICRAMI52622.2021.9585978","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585978","url":null,"abstract":"In this work, we have proposed in unknown setting, there is an impediment avoidance for a mobile robot based on the fuzzy logic control. Therefore, the wheeled mobile robot is equipped with 3 wheels, one steering wheel and two fixed wheels and mounted on the same axis. It functions to lift from a starting point to a target position. For this, our proposed algorithm creates one or more imaginary target and applies a fuzzy logic control system, which is adopted by a rule table that is induced from two inputs data (the distance and the angle between the robot and the target) and two outputs data (the angle orientation and velocity of the steer wheel). Experiential outcomes show how effective and functional the suggested algorithm it is.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585941
Lallouani Bouchakour, Fariza Meziani, H. Latrache, Khadija Ghribi, Mustapha Yahiaoui
In this paper we investigate the optical characters recognition for Arabic language (AOCR). This system is considered as a challenging research topic due to richness and difficulties of Arabic writing. The OCR system incorporates three main stages that are segmentation, feature extraction and recognition. In this work, we have proposed a new method to recognize printed Arabic characters. This method is based on the combined features extraction, which are the densities of black pixels, invariant moments of Hu and Gabor features and the Convolution Neural Network CNN classifier. Experiments are conducted on the Printed Arabic Text set PAT-A01.The result show that the features combination enhances the recognition accuracy rate.
{"title":"Printed Arabic Characters Recognition Using Combined Features and CNN classifier","authors":"Lallouani Bouchakour, Fariza Meziani, H. Latrache, Khadija Ghribi, Mustapha Yahiaoui","doi":"10.1109/ICRAMI52622.2021.9585941","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585941","url":null,"abstract":"In this paper we investigate the optical characters recognition for Arabic language (AOCR). This system is considered as a challenging research topic due to richness and difficulties of Arabic writing. The OCR system incorporates three main stages that are segmentation, feature extraction and recognition. In this work, we have proposed a new method to recognize printed Arabic characters. This method is based on the combined features extraction, which are the densities of black pixels, invariant moments of Hu and Gabor features and the Convolution Neural Network CNN classifier. Experiments are conducted on the Printed Arabic Text set PAT-A01.The result show that the features combination enhances the recognition accuracy rate.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129514018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585933
N. Boutasseta, M. Bouakkaz, I. Attoui, Nadir Fergani, A. Bouraiou, NECAIBIA Ammar
Solar energy represents the main source of renewable power generation. This paper deals with the design of an efficient photovoltaic (PV) solar energy conversion system using maximum power point tracking techniques. Initially, aspects of planning and estimation of the PV systems performance were considered. The optimum operating point of a photovoltaic array is called Maximum Power Point (MPP), which varies depending on the cell temperature and the sun's insulation level. In order to achieve the goal of the Maximum Power Point Tracking (MPPT), three types of algorithms were developed in this work. The first algorithm is based on a neural network approach (ANN) that uses the backpropagation as its training algorithm. The second algorithm is based on fuzzy logic (FL), which uses the properties of the panel for its Maximum Power Point prediction, where the performance depends on the logic of the fuzzy rule. The third method is based on the Hill climbing (HC) algorithm that determines the maximum power point by correlating the changes in power with the changes in the control variable which has the advantage of network independent system and periodic tuning is not required.
{"title":"Implementation of MPPT Methods for improving the Performance of Photovoltaic Systems","authors":"N. Boutasseta, M. Bouakkaz, I. Attoui, Nadir Fergani, A. Bouraiou, NECAIBIA Ammar","doi":"10.1109/ICRAMI52622.2021.9585933","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585933","url":null,"abstract":"Solar energy represents the main source of renewable power generation. This paper deals with the design of an efficient photovoltaic (PV) solar energy conversion system using maximum power point tracking techniques. Initially, aspects of planning and estimation of the PV systems performance were considered. The optimum operating point of a photovoltaic array is called Maximum Power Point (MPP), which varies depending on the cell temperature and the sun's insulation level. In order to achieve the goal of the Maximum Power Point Tracking (MPPT), three types of algorithms were developed in this work. The first algorithm is based on a neural network approach (ANN) that uses the backpropagation as its training algorithm. The second algorithm is based on fuzzy logic (FL), which uses the properties of the panel for its Maximum Power Point prediction, where the performance depends on the logic of the fuzzy rule. The third method is based on the Hill climbing (HC) algorithm that determines the maximum power point by correlating the changes in power with the changes in the control variable which has the advantage of network independent system and periodic tuning is not required.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115535623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, E-health is increasingly used to offer applications that respond to the healthcare professionals’ problems and improve the services provided to their patients. In this work we focus on the visualization and manipulation of medical images by several physicians within the framework of a tele-expertise service. Indeed, such a service allows a local physician to share his patient's medical data with one or more remote medical experts in order to get a second medical opinion to better diagnose and/or treat the patient. The proposed solution in this paper allows collaborative visualization of medical images based on the DICOM standard via a web viewer, the annotations added by the remote physician are synchronized in real-time using WebRTC protocol, allowing a common display for all physicians participating in the tele-expertise session.
{"title":"Collaborative Visualization and Annotations of DICOM Images for Real-Time Web-based Telemedicine System","authors":"Khadidja Belgacem, Mouna Kenoui, Feriel Bouguerra, Mohammed Laidi, Amine Semrani, Celia Sellah","doi":"10.1109/ICRAMI52622.2021.9585938","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585938","url":null,"abstract":"Nowadays, E-health is increasingly used to offer applications that respond to the healthcare professionals’ problems and improve the services provided to their patients. In this work we focus on the visualization and manipulation of medical images by several physicians within the framework of a tele-expertise service. Indeed, such a service allows a local physician to share his patient's medical data with one or more remote medical experts in order to get a second medical opinion to better diagnose and/or treat the patient. The proposed solution in this paper allows collaborative visualization of medical images based on the DICOM standard via a web viewer, the annotations added by the remote physician are synchronized in real-time using WebRTC protocol, allowing a common display for all physicians participating in the tele-expertise session.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133224945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/ICRAMI52622.2021.9585930
Heddar Amina, Kada Maissa
In this paper we consider infinite dimensional systems subjected to stochastic structured multiperturbations. We address the problem of robustness optimization with respect to state feedback but allow both unbounded input and perturbations. Conditions are derived for the existence of a stabilizing controller ensuring that the norm of the closed loop operator below a prespecified bound. Such controllers will be called suboptimal controllers. The suboptimality conditions are obtained in terms of a Riccati equation which satisfies an operator inequality. Finally, we give a lower bound for the supremal achievable stability radius via the Riccati equation.
{"title":"Maximization of the Stability Radius of an Infinite Dimensional System Subjected to Stochastic Unbounded Structured Multi-perturbations With Unbounded Input Operator","authors":"Heddar Amina, Kada Maissa","doi":"10.1109/ICRAMI52622.2021.9585930","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585930","url":null,"abstract":"In this paper we consider infinite dimensional systems subjected to stochastic structured multiperturbations. We address the problem of robustness optimization with respect to state feedback but allow both unbounded input and perturbations. Conditions are derived for the existence of a stabilizing controller ensuring that the norm of the closed loop operator below a prespecified bound. Such controllers will be called suboptimal controllers. The suboptimality conditions are obtained in terms of a Riccati equation which satisfies an operator inequality. Finally, we give a lower bound for the supremal achievable stability radius via the Riccati equation.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128285200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}